| Summary: | gnupg2 new security issue CVE-2019-14855 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | andrewsfarm, lists.jjorge, mageia, sysadmin-bugs, tmb |
| Version: | 7 | Keywords: | advisory, validated_update |
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | MGA7-32-OK MGA7-64-OK | ||
| Source RPM: | gnupg2-2.2.17-1.mga7.src.rpm | CVE: | CVE-2019-14855 |
| Status comment: | |||
|
Description
David Walser
2019-11-26 12:15:46 CET
Advisory
========
GnuPG has been updated to fix a security issue (CVE-2019-14855).
Changes include the following:
* gpg: Prepare against chosen-prefix SHA-1 collisions in key
signatures. This change removes all SHA-1 based key signature
newer than 2019-01-19 from the web-of-trust. Note that this
includes all key signature created with dsa1024 keys. The new
option --allow-weak-key-signatues can be used to override the new
and safer behaviour.
References
==========
https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html
Files
=====
Uploaded to core/updates_testing
gnupg2-2.2.18-1.mga7
from gnupg2-2.2.18-1.mga7.src.rpmAssignee:
smelror =>
qa-bugs Tested with enigmail on thunderbird, all ok. CC:
(none) =>
lists.jjorge
José Jorge
2019-11-29 11:07:03 CET
Whiteboard:
(none) =>
MGA7-32-OK Installed and tested without issue. Tested using kleopatra, kmail and gpg cli. Tested sign, verify, encrypt, decrypt, search key, refresh keys, import, export, list keys. $ uname -a Linux marte 5.3.13-desktop-2.mga7 #1 SMP Mon Nov 25 20:30:40 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux $ rpm -q gnupg2 gnupg2-2.2.18-1.mga7 Whiteboard:
MGA7-32-OK =>
MGA7-32-OK MGA7-64-OK Validating. Advisory in Comment 1. CC:
(none) =>
andrewsfarm, sysadmin-bugs
Thomas Backlund
2019-11-30 12:45:24 CET
CC:
(none) =>
tmb An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2019-0348.html Status:
NEW =>
RESOLVED |